Abstract
Reversible watermarking which can restore the original media after the watermark is extracted, is a potential technique for integrity verification and tamper detecting. In this paper we proposed a reversible fragile watermarking scheme for audio authentication by using Integer Discrete Cosine Transform (intDCT) and expansion embedding. The main contribution consists of: 1) we observe that an audio frame would be distorted after undergoing the intDCT, amplitude expansion (AE) embedding and inverse intDCT operations. The distortion is analyzed in detail and the corresponding solution is proposed for; 2) In the integer DCT domain, two reversible audio watermarking algorithms based on difference expansion (DE) and prediction-error expansion (PE) are designed for the distortion and audio authentication. Experimental results show that the proposed reversible watermarking approaches can be used for integrity verification and tampering location while achieving better fidelity than the AE scheme for the same embedding payload.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Trans. Circuits and Systems for Video Technology 13(8), 890–896 (2003)
Alattar, A.M.: Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform. IEEE Trans. Image Process. 13(8), 1147–1156 (2004)
Thodi, D.M., Rodriguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. Image Processing 16(3), 721–730 (2007)
Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.: Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009)
Lee, S., Yoo, C.D., Kalker, T.: Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform. IEEE Trans. Information Forensics and Security 2(3), 321–330 (2007)
Yang, B., Schmucker, M., Funk, W., et al.: Integer DCT-based Reversible Watermarking for Images Using Companding Technique. In: Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 405–415 (2004)
van der Veen, M., Bruekers, F., van Leest, A., Cavin, S.: High Capacity Reversible Watermarking for Audio. In: Proc. SPIE Security and Watermarking of Multimedia Contents V, vol. 5020, pp. 1–11 (2003)
Bradley, B., Alattar, A.M.: High-Capacity, Invertible, Data-Hiding Algorithm for Digital Audio. In: Proc. SPIE Security and Watermarking of Multimedia Contents VII, vol. 5681, pp. 789–800 (2005)
Yan, D., Wang, R.: Reversible Data Hiding for Audio Based on Prediction Error Expansion. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 249–252 (2008)
Steinebach, M., Dittmann, J.: Watermarking-Based Digital Audio Data Authentication. EURASIP Journal on Applied Signal Processing, 1001–1015 (2003)
Huang, X., Nishimura, A., Echizen, I.: A Reversible Acoustic Steganography for Integrity Verification. In: Kim, H.-J., Shi, Y., Barni, M. (eds.) IWDW 2010. LNCS, vol. 6526, pp. 305–316. Springer, Heidelberg (2011)
Huang, H., Rahardja, S., Yu, R.: A Fast Algorithm of Integer MDCT for Lossless Audio Coding. In: IEEE ICASSP 2004, pp. IV177–IV180 (2004)
Xiang, S., Huang, J.: Histogram-Based Audio Watermarking against Time-Scale Modification and Cropping Attacks. IEEE Trans. on Multimedia 9(7), 1357–11372 (2007)
Xiang, S.: Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 224–239. Springer, Heidelberg (2013)
Weng, S., Zhao, Y., Pan, J.-S.: Reversible Watermarking Resistant to Cropping Attack. IET Information Security 1(2), 91–95 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, Q., Xiang, S., Luo, X. (2013). Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)